CVE-2024-28084
📋 TL;DR
This vulnerability in iNet wireless daemon (IWD) allows attackers to cause denial of service through daemon crashes by exploiting initialization issues during parsing of advertised service information. It affects all systems running IWD versions through 2.15. The impact could potentially extend beyond DoS to unspecified other impacts.
💻 Affected Systems
- iNet wireless daemon (IWD)
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of wireless connectivity services, potential remote code execution if combined with other vulnerabilities, and system instability requiring manual intervention.
Likely Case
Service disruption causing wireless connectivity loss, requiring daemon restart or system reboot to restore functionality.
If Mitigated
Minimal impact with proper network segmentation and monitoring, limited to isolated wireless service interruption.
🎯 Exploit Status
Exploitation requires sending malformed service advertisements to the wireless interface. No authentication needed, making it accessible to nearby attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 2.15 (patched in git commits 52a47c9fd428904de611a90cbf8b223af879684d and d34b4e16e045142590ed7cb653e01ed0ae5362eb)
Vendor Advisory: https://git.kernel.org/pub/scm/network/wireless/iwd.git/
Restart Required: Yes
Instructions:
1. Update IWD package using your distribution's package manager. 2. For Fedora: 'sudo dnf update iwd'. 3. Restart IWD service: 'sudo systemctl restart iwd'. 4. Verify the service is running: 'sudo systemctl status iwd'.
🔧 Temporary Workarounds
Disable IWD temporarily
linuxStop using IWD and switch to alternative wireless management until patched
sudo systemctl stop iwd
sudo systemctl disable iwd
Network isolation
allRestrict wireless network access to trusted devices only
🧯 If You Can't Patch
- Implement strict wireless network segmentation to limit attack surface
- Monitor IWD service logs for crash events and implement automated restart scripts
🔍 How to Verify
Check if Vulnerable:
Check IWD version: 'iwd --version' or 'rpm -q iwd' or 'dpkg -l iwd'. If version is 2.15 or earlier, system is vulnerable.
Check Version:
iwd --version 2>/dev/null || rpm -q iwd 2>/dev/null || dpkg -l iwd 2>/dev/null | grep ^ii
Verify Fix Applied:
Verify version is newer than 2.15 and check git commit includes fixes 52a47c9fd428904de611a90cbf8b223af879684d or d34b4e16e045142590ed7cb653e01ed0ae5362eb.
📡 Detection & Monitoring
Log Indicators:
- IWD daemon crash logs in systemd/journalctl
- Segmentation fault errors in IWD logs
- Unexpected service restarts
Network Indicators:
- Unusual wireless service advertisement packets
- Multiple connection drops on wireless interfaces
SIEM Query:
source="systemd" AND (process="iwd" AND (message="segmentation fault" OR message="crash" OR message="terminated"))
🔗 References
- https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=52a47c9fd428904de611a90cbf8b223af879684d
- https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=d34b4e16e045142590ed7cb653e01ed0ae5362eb
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KSGT4IZ23CJBOQA3AFYEMBJ5OHFZBMK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYRPQ3OLV3GGLUCDYWBHU34DLBLM62XJ/
- https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=52a47c9fd428904de611a90cbf8b223af879684d
- https://git.kernel.org/pub/scm/network/wireless/iwd.git/commit/?id=d34b4e16e045142590ed7cb653e01ed0ae5362eb
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KSGT4IZ23CJBOQA3AFYEMBJ5OHFZBMK/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYRPQ3OLV3GGLUCDYWBHU34DLBLM62XJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4KSGT4IZ23CJBOQA3AFYEMBJ5OHFZBMK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYRPQ3OLV3GGLUCDYWBHU34DLBLM62XJ/